...
首页> 外文期刊>Journal of Computers >The Switching Glitch Power Leakage Model
【24h】

The Switching Glitch Power Leakage Model

机译:开关故障功率泄漏模型

获取原文
           

摘要

Power analysis attacks are based on analyzing the power consumption of the cryptographic devices while they perform the encryption operation. Correlation Power Analysis (CPA) attacks exploit the linear relation between the known power consumption and the predicted power consumption of cryptographic devices to recover keys. It has been one of the effective side channel attacks that threaten the security of CMOS circuits. However, few works consider the leakage of glitches at the logic gates. In this paper, we present a new power consumption model, namely Switching Glitch (SG) power leakage model, which not only considers the data dependent switching activities but also including glitch power consumptions in CMOS circuits. Additionally, from a theoretical point of view, we show how to estimate the glitch factor. The experiments against AES implementation validate the proposed model. Compared with CPA based on Hamming Distance model, the power traces of recovering keys have been decreased by as much as 28.9%.
机译:功率分析攻击基于对加密设备执行加密操作时的功耗的分析。相关功率分析(CPA)攻击利用了已知功耗与加密设备的预计功耗之间的线性关系来恢复密钥。它已经成为威胁CMOS电路安全性的有效副通道攻击之一。但是,很少有工作考虑逻辑门的毛刺泄漏。在本文中,我们提出了一种新的功耗模型,即开关毛刺(SG)漏电模型,该模型不仅考虑了与数据有关的开关活动,而且还考虑了CMOS电路中的毛刺功耗。此外,从理论上讲,我们展示了如何估计毛刺因子。针对AES实现的实验验证了所提出的模型。与基于汉明距离模型的CPA相比,恢复密钥的电源迹线减少了多达28.9%。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号